Vivisect Structure Definition/Parsing Library
☆23Jul 25, 2017Updated 8 years ago
Alternatives and similar repositories for vstruct2
Users that are interested in vstruct2 are comparing it to the libraries listed below
Sorting:
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆30Jun 24, 2015Updated 10 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- ☆13Jun 25, 2016Updated 9 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 8 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆92Oct 14, 2014Updated 11 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- libtalloc is a python script for use with GDB that can be used to analyse the "trivial allocator" (talloc)☆17Aug 6, 2015Updated 10 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- ☆33Mar 4, 2022Updated 3 years ago
- Miscellaneous Tools☆37May 31, 2015Updated 10 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- D3D9Hook is a library simplifying a DirectX 9 hooking using a DLL injection. It includes basic drawing features such as rectangle drawing…☆14Jul 14, 2016Updated 9 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- A repository of scripts and files related to the CryptoWall version 3 threat☆12Mar 3, 2016Updated 9 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Jul 14, 2020Updated 5 years ago
- basic dll injector using Qt☆20May 31, 2017Updated 8 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Oct 3, 2013Updated 12 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago